General

  • Target

    36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488

  • Size

    12.9MB

  • Sample

    220511-3arhsacfe3

  • MD5

    d6c42156c6c44da64fe062891eb5aa17

  • SHA1

    7fe05a8589a45d70d8c19f39b1d7c53390648e83

  • SHA256

    36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488

  • SHA512

    bb2002558c38c9f87a01c082f0c4d9d665400d8e834b4f34eaa200dcfe008670005d702d647698723de1db0cd3f517158b2b0f6b55a451dd62a64eb1915b038b

Malware Config

Extracted

Family

raccoon

rc4.plain

Extracted

Family

raccoon

Botnet

c763e433ef51ff4b6c545800e4ba3b3b1a2ea077

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Targets

    • Target

      36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488

    • Size

      12.9MB

    • MD5

      d6c42156c6c44da64fe062891eb5aa17

    • SHA1

      7fe05a8589a45d70d8c19f39b1d7c53390648e83

    • SHA256

      36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488

    • SHA512

      bb2002558c38c9f87a01c082f0c4d9d665400d8e834b4f34eaa200dcfe008670005d702d647698723de1db0cd3f517158b2b0f6b55a451dd62a64eb1915b038b

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks